2
views
0
recommends
+1 Recommend
2 collections
    0
    shares

      Submit your digital health research with an established publisher
      - celebrating 25 years of open access

      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Personal Information Protection and Privacy Policy Compliance of Health Code Apps in China: Scale Development and Content Analysis

      research-article
      , PhD, , PhD
      (Reviewer), (Reviewer)
      JMIR mHealth and uHealth
      JMIR Publications Inc
      contact tracing, privacy policy, personal information protection, compliance, content analysis, COVID-19

      Read this article at

      ScienceOpenPublisherPMC
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Background

          Digital technologies, especially contact tracing apps, have been crucial in monitoring and tracing the transmission of COVID-19 worldwide. China developed health code apps as an emergency response to the pandemic with plans to use them for broader public health services. However, potential problems within privacy policies may compromise personal information (PI) protection.

          Objective

          We aimed to evaluate the compliance of the privacy policies of 30 health code apps in the mainland of China with the Personal Information Protection Law (PIPL) and related specifications.

          Methods

          We reviewed and assessed the privacy policies of 30 health code apps between August 26 and September 6, 2023. We used a 3-level indicator scale based on the information life cycle as provided in the PIPL and related specifications. The scale comprised 7 level-1 indicators, 26 level-2 indicators, and 71 level-3 indicators.

          Results

          The mean compliance score of the 30 health code apps was 59.9% (SD 22.6%). A total of 13 (43.3%) apps scored below this average, and 6 apps scored below 40%. Level-1 indicator scores included the following: general attributes (mean 85.6%, SD 23.3%); PI collection and use (mean 66.2%, SD 22.7%); PI storage and protection (mean 63.3%, SD 30.8%); PI sharing, transfer, disclosure, and transmission (mean 57.2%, SD 27.3%); PI deletion (mean 52.2%, SD 29.4%); individual rights (mean 59.3%, SD 25.7%); and PI processor duties (mean 43.7%, SD 23.8%). Sensitive PI protection compliance (mean 51.4%, SD 26.0%) lagged behind general PI protection (mean 83.3%, SD 24.3%), with only 1 app requiring separate consent for sensitive PI processing. Additionally, 46.7% (n=14) of the apps needed separate consent for subcontracting activities, while fewer disclosed PI recipient information (n=13, 43.3%), safety precautions (n=11, 36.7%), and rules of PI transfer during specific events (n=10, 33.3%). Most privacy policies specified the PI retention period (n=23, 76.7%) and postperiod deletion or anonymization (n=22, 73.3%), but only 6.7% (n=2) were committed to prompt third-party PI deletion. Most apps delineated various individual rights: the right to inquire (n=25, 83.3%), correct (n=24, 80%), and delete PI (n=24, 80%); cancel their account (n=21, 70%); withdraw consent (n=20, 60%); and request privacy policy explanations (n=24, 80%). Only a fraction addressed the rights to obtain copies (n=4, 13.3%) or refuse advertisement of automated decision-making (n=1, 3.3%). The mean compliance rate of PI processor duties was only 43.7% (SD 23.8%), with significant deficiencies in impact assessments (mean 5.0%, SD 19.8%), PI protection officer appointment (mean 6.7%, SD 24.9%), regular compliance audits (mean 6.7%, SD 24.9%), and complaint management (mean 37.8%, SD 39.2%).

          Conclusions

          Our analysis revealed both strengths and significant shortcomings in the compliance of privacy policies of health code apps with the PIPL and related specifications considering the information life cycle. As China contemplates the future extended use of health code apps, it should articulate the legitimacy of the apps’ normalization and ensure that users provide informed consent. Meanwhile, China should raise the compliance level of relevant privacy policies and fortify its enforcement mechanisms.

          Related collections

          Most cited references43

          • Record: found
          • Abstract: found
          • Article: not found

          Digital technology and COVID-19

          The past decade has allowed the development of a multitude of digital tools. Now they can be used to remediate the COVID-19 outbreak.
            Bookmark
            • Record: found
            • Abstract: found
            • Article: not found

            Applications of digital technology in COVID-19 pandemic planning and response

            Summary With high transmissibility and no effective vaccine or therapy, COVID-19 is now a global pandemic. Government-coordinated efforts across the globe have focused on containment and mitigation, with varying degrees of success. Countries that have maintained low COVID-19 per-capita mortality rates appear to share strategies that include early surveillance, testing, contact tracing, and strict quarantine. The scale of coordination and data management required for effective implementation of these strategies has—in most successful countries—relied on adopting digital technology and integrating it into policy and health care. This Viewpoint provides a framework for the application of digital technologies in pandemic management and response, highlighting ways in which successful countries have adopted these technologies for pandemic planning, surveillance, testing, contact tracing, quarantine, and health care.
              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              Geographical tracking and mapping of coronavirus disease COVID-19/severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) epidemic and associated events around the world: how 21st century GIS technologies are supporting the global fight against outbreaks and epidemics

              In December 2019, a new virus (initially called ‘Novel Coronavirus 2019-nCoV’ and later renamed to SARS-CoV-2) causing severe acute respiratory syndrome (coronavirus disease COVID-19) emerged in Wuhan, Hubei Province, China, and rapidly spread to other parts of China and other countries around the world, despite China’s massive efforts to contain the disease within Hubei. As with the original SARS-CoV epidemic of 2002/2003 and with seasonal influenza, geographic information systems and methods, including, among other application possibilities, online real-or near-real-time mapping of disease cases and of social media reactions to disease spread, predictive risk mapping using population travel data, and tracing and mapping super-spreader trajectories and contacts across space and time, are proving indispensable for timely and effective epidemic monitoring and response. This paper offers pointers to, and describes, a range of practical online/mobile GIS and mapping dashboards and applications for tracking the 2019/2020 coronavirus epidemic and associated events as they unfold around the world. Some of these dashboards and applications are receiving data updates in near-real-time (at the time of writing), and one of them is meant for individual users (in China) to check if the app user has had any close contact with a person confirmed or suspected to have been infected with SARS-CoV-2 in the recent past. We also discuss additional ways GIS can support the fight against infectious disease outbreaks and epidemics.
                Bookmark

                Author and article information

                Journal
                JMIR Mhealth Uhealth
                JMIR Mhealth Uhealth
                mhealth
                13
                JMIR mHealth and uHealth
                JMIR Publications Inc
                2291-5222
                2023
                14 November 2023
                : 11
                : e48714
                Affiliations
                [1]Law School, Central South University , Changsha, China
                Author notes
                Correspondence to Zexing Zheng, PhD xing986@ 123456126.com
                [*]

                these authors contributed equally

                Article
                48714
                10.2196/48714
                10686616
                37990813
                506e9fb8-cb78-4933-a249-5a2d05a20b34
                © Jiayi Jiang, Zexing Zheng. Originally published in JMIR mHealth and uHealth ( https://mhealth.jmir.org), 14.11.2023.

                This is an open-access article distributed under the terms of the Creative Commons Attribution License ( https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mHealth and uHealth, is properly cited. The complete bibliographic information, a link to the original publication on https://mhealth.jmir.org/, as well as this copyright and license information must be included.

                History
                : 04 May 2023
                : 15 September 2023
                : 04 October 2023
                Categories
                Original Paper
                Security and Privacy of mHealth and uHealth
                Ethics, Privacy, and Legal Issues
                Policy
                eHealth Infrastructures
                Theme Issue: Apps for COVID-19 (#Apps4Covid)
                mHealth for Health Administration
                E-Health Policy and Health Systems Innovation
                Ethics, Privacy, and Legal Issues
                Mobile Health (mhealth)
                Policy
                Theme Issue: Apps for COVID-19 (#Apps4Covid)
                E-Health Policy and Health Systems Innovation
                Mobile Health (mhealth)
                mHealth for Health Administration
                eHealth Infrastructures

                contact tracing,privacy policy,personal information protection,compliance,content analysis,covid-19

                Comments

                Comment on this article